Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Activity recognition is a key component for creating intelligent, multi-agent systems. Intrinsically, activity recognition is a temporal classification problem. In this paper, we...
Douglas L. Vail, Manuela M. Veloso, John D. Laffer...
Humans naturally share knowledge by telling stories. This is a form of knowledge exchange we engage in right from early childhood, and over time we learn to recall, order and orga...
Most prior work on information extraction has focused on extracting information from text in digital documents. However, often, the most important information being reported in an...
The two separate projects described have examined how teachers exploit computer-based technologies in supporting learning of science at secondary level. This paper examines how pe...
Sara Hennessy, Jocelyn Wishart, Denise Whitelock, ...